Sciweavers

1829 search results - page 313 / 366
» aims 2008
Sort
View
CN
2008
85views more  CN 2008»
14 years 12 months ago
Pollution attacks and defenses for Internet caching systems
Proxy caching servers are widely deployed in today's Internet. While cooperation among proxy caches can significantly improve a network's resilience to denial-ofservice ...
Leiwen Deng, Yan Gao, Yan Chen, Aleksandar Kuzmano...
CN
2008
140views more  CN 2008»
14 years 12 months ago
Congestion control in utility fair networks
This paper deals with a congestion control framework for elastic and real-time traffic, where the user's application is associated with a utility function. We allow users to ...
Tobias Harks, Tobias Poschwatta
COGSCI
2008
139views more  COGSCI 2008»
14 years 12 months ago
A Computational Model of Early Argument Structure Acquisition
How children go about learning the general regularities that govern language, as well as keeping track of the exceptions to them, remains one of the challenging open questions in ...
Afra Alishahi, Suzanne Stevenson
COMCOM
2008
100views more  COMCOM 2008»
14 years 12 months ago
The impact of code allocation on the multiple access interference in WCDMA systems
Code allocation has a significant impact on the performance of Code Division Multiple Access (CDMA) systems. For the uplink direction, in 3G Wideband CDMA (WCDMA) cellular systems...
Thamer Al-Meshhadany, Wessam Ajib
COMCOM
2008
120views more  COMCOM 2008»
14 years 12 months ago
Game theoretic models for detecting network intrusions
In this paper, we study using game theory the problem of detecting intrusions in wired infrastructure networks. Detection is accomplished by sampling a subset of the transmitted p...
Hadi Otrok, Mona Mehrandish, Chadi Assi, Mourad De...